General
-
Target
a9a587421d540f7622540e7f71a6859a87e5f4088b4af9fbebfa1c26275f8335
-
Size
539KB
-
Sample
230324-jsy6ssda56
-
MD5
f16bdf4f24c2c44b7cf2d3ad92c06f26
-
SHA1
c459adf707f27852dcbbe009ec1783f62d296054
-
SHA256
a9a587421d540f7622540e7f71a6859a87e5f4088b4af9fbebfa1c26275f8335
-
SHA512
cff9141484c10ba958b6c804b8f2c98d1b4b58dff18f5752afd9cf5e78a2258bc3dfc0f601a6c32177ac190865d5285bb25b6521e0de1df33f813cbc9ab148d8
-
SSDEEP
12288:PMrgy90UUXKaUekh3O8nMB6fER2YOCtieJ/vrr:TyvUZkh3Ol6fg22sm
Static task
static1
Behavioral task
behavioral1
Sample
a9a587421d540f7622540e7f71a6859a87e5f4088b4af9fbebfa1c26275f8335.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
a9a587421d540f7622540e7f71a6859a87e5f4088b4af9fbebfa1c26275f8335
-
Size
539KB
-
MD5
f16bdf4f24c2c44b7cf2d3ad92c06f26
-
SHA1
c459adf707f27852dcbbe009ec1783f62d296054
-
SHA256
a9a587421d540f7622540e7f71a6859a87e5f4088b4af9fbebfa1c26275f8335
-
SHA512
cff9141484c10ba958b6c804b8f2c98d1b4b58dff18f5752afd9cf5e78a2258bc3dfc0f601a6c32177ac190865d5285bb25b6521e0de1df33f813cbc9ab148d8
-
SSDEEP
12288:PMrgy90UUXKaUekh3O8nMB6fER2YOCtieJ/vrr:TyvUZkh3Ol6fg22sm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-